Research

Paper

AI LLM March 12, 2026

Highly Autonomous Cyber-Capable Agents: Anticipating Capabilities, Tactics, and Strategic Implications

Authors

Jam Kraprayoon, Shaun Ee, Brianna Rosen, Yohan Matthew, Aditya Singh, Christopher Covino, Asher Brass Gershovich

Abstract

This report introduces the concept of "Highly Autonomous Cyber-Capable Agents" (HACCAs), AI systems capable of autonomously conducting multi-stage cyber campaigns at a level comparable to today's top criminal hacking groups or state-affiliated threat actors, and analyzes the security implications of their emergence. The report: (1) Defines what HACCAs are and forecasts when they might arrive, establishing a clear framework for an autonomous cyber agent that can operate across the full attack lifecycle without meaningful human direction; (2) Identifies five core operational tactics, detailing how HACCAs could sustain themselves in the wild, from autonomous infrastructure setup and credential harvesting to detection evasion and adaptive shutdown avoidance; (3) Analyzes the strategic implications, including how HACCAs could intensify interstate cyber competition, lower the barrier to entry for sophisticated operations, and proliferate advanced offensive capabilities to criminal groups and less-resourced state actors; (4) Flags two tail risks that deserve serious attention: the potential for autonomous cyber operations to trigger inadvertent cyber-nuclear escalation, and the possibility of sustained loss of control over rogue HACCA deployments; (5) Proposes seven policy recommendations across three goals: understanding the emerging threat, defending against HACCAs, and ensuring their responsible development and deployment.

Metadata

arXiv ID: 2603.11528
Provider: ARXIV
Primary Category: cs.CY
Published: 2026-03-12
Fetched: 2026-03-14 05:03

Related papers

Raw Data (Debug)
{
  "raw_xml": "<entry>\n    <id>http://arxiv.org/abs/2603.11528v1</id>\n    <title>Highly Autonomous Cyber-Capable Agents: Anticipating Capabilities, Tactics, and Strategic Implications</title>\n    <updated>2026-03-12T04:30:47Z</updated>\n    <link href='https://arxiv.org/abs/2603.11528v1' rel='alternate' type='text/html'/>\n    <link href='https://arxiv.org/pdf/2603.11528v1' rel='related' title='pdf' type='application/pdf'/>\n    <summary>This report introduces the concept of \"Highly Autonomous Cyber-Capable Agents\" (HACCAs), AI systems capable of autonomously conducting multi-stage cyber campaigns at a level comparable to today's top criminal hacking groups or state-affiliated threat actors, and analyzes the security implications of their emergence. The report: (1) Defines what HACCAs are and forecasts when they might arrive, establishing a clear framework for an autonomous cyber agent that can operate across the full attack lifecycle without meaningful human direction; (2) Identifies five core operational tactics, detailing how HACCAs could sustain themselves in the wild, from autonomous infrastructure setup and credential harvesting to detection evasion and adaptive shutdown avoidance; (3) Analyzes the strategic implications, including how HACCAs could intensify interstate cyber competition, lower the barrier to entry for sophisticated operations, and proliferate advanced offensive capabilities to criminal groups and less-resourced state actors; (4) Flags two tail risks that deserve serious attention: the potential for autonomous cyber operations to trigger inadvertent cyber-nuclear escalation, and the possibility of sustained loss of control over rogue HACCA deployments; (5) Proposes seven policy recommendations across three goals: understanding the emerging threat, defending against HACCAs, and ensuring their responsible development and deployment.</summary>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.CY'/>\n    <published>2026-03-12T04:30:47Z</published>\n    <arxiv:comment>159 pages</arxiv:comment>\n    <arxiv:primary_category term='cs.CY'/>\n    <author>\n      <name>Jam Kraprayoon</name>\n    </author>\n    <author>\n      <name>Shaun Ee</name>\n    </author>\n    <author>\n      <name>Brianna Rosen</name>\n    </author>\n    <author>\n      <name>Yohan Matthew</name>\n    </author>\n    <author>\n      <name>Aditya Singh</name>\n    </author>\n    <author>\n      <name>Christopher Covino</name>\n    </author>\n    <author>\n      <name>Asher Brass Gershovich</name>\n    </author>\n  </entry>"
}